Suspection Less Steganographic Approach using Enigma Intermix Cube Encryption Technique
T. Gomathi1, B. L. Shivakumar2

1Prof. T. Gomathi, Research Scholar, Karpagam University, Coimbatore (Tamil Nadu), India.
2Dr. B. L. Shivakumar, Director, Department of Computer Application, Sri Ramakrishna Engineering College, Coimbatore (Tamil Nadu), India.
Manuscript received on 10 September 2014 | Revised Manuscript received on 20 September 2014 | Manuscript Published on 30 September 2014 | PP: 52-56 | Volume-4 Issue-4, September 2014 | Retrieval Number: D1802094414/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Steganography is a process of hiding one data behind an image. A text data or an image in one format is being hidden in other image or text data of the same format or of the different format. The data transmitted nowadays are being hacked easily by intruders, such that the purpose of secured transmission fails there. There are several traditional ways of transmitting data such as encryption, scrambling, watermarking, steganography, etc; the process of encryption involves changing data in one format to the other and transmitting. When the decryption method is known to the intruders then the data is easily available for them. Most of the encryption techniques are easy to predict. The process of scrambling involves shuffling the positions of the data in a format, which when applied in the reverse order or applied continuously will result in the original data. Watermarking is a process of embedding an image or text or logo in another image such that it is partially visible on the main data and hence it doesn’t so well for secured transmission technique. Similarly the various traditional methods of steganography have some disadvantages. Some among them are listed below.
Keywords: Encryption, HVS (Human Visual System), LSB (Least Significant Bit), PSNR (Peak Signal Noise Ratio), Steganography.

Scope of the Article: Encryption Methods and Tools